Please turn on your JavaScript for this page to function normally.
Android unlocked
How secure are mobile banking apps?

Do banking institutions have a good handle on the things they need to remediate and new control layers they need to adopt to keep users secure? To answer those questions, …

PC
Security improvements primary reason for Windows 10 migration

Migration to Windows 10 is expected to be faster than previous OS adoption, according to a survey by Gartner. The survey showed that 85 percent of enterprises will have …

sap
SAP closes critical vulnerability affecting TREX

SAP closed a critical vulnerability for an issue that was exposed for almost two years. The vulnerability (SAP Security Note 2419592) affects TREX, a SAP NetWeaver standalone …

Trump
Use of digital privacy tools increased in wake of Trump’s ascent to power

Since Edward Snowden’s revelations about the extent of global online and communications surveillance, the issue of privacy of online browsing habits and digital …

Android apps
Through inter-app data sharing, Android apps can get your data without permission

With a newly developed toolsuite that can analyze Android apps and detect whether two or more of them can collude with each other to acquire information that they would …

PC
Java and Flash top list of most outdated programs on users’ PCs

52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …

Windows
DoubleAgent attack uses built-in Windows tool to hijack applications

Security researchers from computer and network security outfit Cybellum have revealed a new zero-day code injection and persistence technique that can be used by attackers to …

Intel is offering up to $30,000 for bugs in its hardware

Intel has become the latest tech company to launch a bug bounty program. Intel bug bounty program: What’s in scope and what is not Intel is looking for bug hunters to …

gap
Several high risk 0-day vulnerabilities affecting SAP HANA found

Onapsis discovered several high risk vulnerabilities affecting SAP HANA platforms. If exploited, these vulnerabilities would allow an attacker, whether inside or outside the …

Cybereason RansomFree
Catch emerging strains of ransomware with RansomFree

In this podcast recorded at RSA Conference 2017, Yoel Eilat, Senior Product Manager at Cybereason, talks about RansomFree – the free, anti-ransomware protection …

Confide
Encrypted messaging app Confide suffers from many security issues

Confide, the encrypted instant messaging application with a self-destructing messaging system that has become popular with White House staffers, is not so secure after all. …

close laptop
ESET antivirus opens Macs to remote code execution

Like any other software, security software is sure to have some vulnerabilities that can be exploited by attackers. The latest in a long list of examples that prove this fact …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools